|Research Topic||Paper ID|
|Distributed Secure Collaboration for Spectrum Management in Cognitive Radio Networks
Obeten Obi Ekabua, Nnenna Christine Eric-Nwonye
Abstract: Cognitive radio technology offers a new mechanism for flexible usage of the frequency spectrum because even though the number of available frequency bands are decreasing, considerable portions of the frequency spectrum at a given time and place are not fully utilized. However, cognitive radios need to use the temporarily free licensed spectrum in a manner that they do not interfere with the license or primary users. This non-interference can be achieved through spectrum management which entails four important functionalities; spectrum sensing, spectrum decision, spectrum sharing and spectrum mobility. In cognitive radio networks, collaborative spectrum management is an effective method of correctly estimating the occupancy state of the channel and efficiently utilizing the spectrum. The nodes in a cognitive radio network are assumed to be honest, however, the system can be misled by false information sent by compromised nodes. In this paper, we develop a method for the detection of untrustworthy secondary users by investigating the case when there is only one compromised node and the case when multiple nodes are compromised in a cognitive radio network.
|Uniform Local Active Forces: A Novel Gray-Scale Invariant Local Feature Representation for Facial Expression Recognition
Mohammad Shahidul Islam
Abstract: Facial expression recognition is a dynamic topic in multiple disciplines: psychology, behavior science, sociology, medical science, computer science, etc. Local feature representation such as Local Binary Pattern is widely adopted by many researchers for facial expression recognition due to its simplicity and high efficiency. But long histogram produced by Local Binary Pattern is not suitable for large-scale face database. Considering this problem, a simple gray-scale invariant local feature descriptor is proposed for facial expression recognition. Local feature of pixel is computed based on magnitudes of gray color intensity differences of the pixel and its neighboring pixels. A facial image is divided into 9×9=81 blocks and the histograms of local features for all 81 blocks are concatenated to serve as a local distinctive descriptor of the facial image. Extended Cohn-Kanade dataset is used to evaluate the efficiency of the proposed method. It is compared with other appearance based feature representations for static image in terms of classification accuracy using multiclass SVM. Experimental results show that the proposed feature representation along with Support Vector Machine is effective for facial expression recognition.
|Simulation of Single-Phase Uninterruptible Power Supply Based on Z-Source Inverter
K Anil Kumar, LAXMINARAYANA G
Abstract: This paper proposes a topology of uninterruptable power supply (UPS) by using a Z-source inverter, where a symmetrical LC network is employed to couple the main power Circuit of an inverter to a battery bank. In this project, we suggested a new topology of the UPS is proposed by using a Z-source inverter. With this new topology, the proposed UPS offers the following advantages over the traditional UPSs: 1) The dc/dc booster and the inverter have been combined into one single-stage power conversion; 2) the distortion of the ac output-voltage waveform is reduced in the absence of dead time in the PWM signals; and 3) the system has achieved fast transient response and good steady state performance by adopting dual-loop control. Z-Source inverters have recently been proposed as an alternative power conversion concept as they have both voltage buck and boost capabilities. This inverter use a unique impedance network (Z-source network), coupled between the power source and converter circuit to provide both voltage buck and boost properties, which cannot be achieved with conventional voltage-source and current-source inverter. With this new topology, the proposed UPS can maintain the desired AC output voltage at the signiﬁcant voltage drop of the battery bank with high efficiency, low harmonics, fast response and good steady-state performance in comparison with traditional UPSs. Simulation results are presented to validate the advantage of the proposed Z-source based UPS by using MATLAB/SIMULINK model.
|A Hybrid Approach for Prostate Boundary detection using Ant Colony Optimization and Artificial Neural Network
Richa Kaushal, Vikas Gupta
Abstract: Number of Computer Vision and Machine Vision researchers concentrating on the field of Medical Diagnosis. Where some fruitful results came and help the experts or doctors to make the diagnosis process efficient and easy . Prostate Cancer has a considerable impact on the life of adult men. So it is very important to detect Prostate Cancer at early stages. But the main barriers in this field are Poor image quality, presence of noise etc. restrict us to make exact decisions . So the poor image quality, speckle noise & shadowing effects in ultrasound images i.e. the most common imaging technology used in most of the urologic clinics for the treatment of cancer, achieving an accurate, robust & fast performance in automatic boundary detection is difficult & time-consuming . Moreover, manual contouring too is time-consuming & subject to inter-and intra-observer bias. A lot of work has been carried out in processing & segmentation of prostate boundary, but still there is a room for further improvement in this area. we proposed a new hybrid technique in which we pick two optimization techniques to deal with this issue. Ant Colony Optimization and Artificial Neural Network are use to get the prostate boundary also the results obtained after this experiment are also compared with the result given by the method where Genetic Algorithm optimization technique is used to get the prostate boundary.
|Design and implementation of low power 16 bit ALU with clock gating
Abstract: The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern. In this paper a low power 16 bit ALU is designed using VHDL. Lower power consumption is achieved by using clock gating technique and the results are compared with conventional ALU design. A carry skip adder with variable block length is used for the arithmetic unit to achieve better performance. The design is then implemented in Xilinx Spartan 3E FPGA . The ALU achieves a maximum frequency of 65.19 MHz with a dynamic power dissipation of 1.98 mW when operated at 15 MHz.
|Intelligent Transportation System and Vehicle Detection Techniques
Dinesh Bhardwaj, Gulshan Goyal
Abstract: Increasing the efficiency and capacity of the existing traffic monitoring network is today’s requirement due to the continuous increase in traffic volume and the limited construction of new highway facilities in urban and rural areas. Traffic congestion can lead to drivers becoming frustrated and engaging in rage. Traffic congestion in the larger cities of the world is a growing problem that has to be taken into account seriously. After a long time survey in the field of Vehicle and Highway System, different alternatives are analyzed to solve this problem and the concept of Intelligent Transportation System (ITS) is proposed as the best solution. This contains flexible system that can respond in an effective way to solve the problem of traffic congestion. Present paper provides a state-of-practice summary of ITS evaluation methods and impact measurement efforts, by drawing on a comprehensive survey of available literature.
|Replication in Mobile Ad-hoc Network Using Hopfield Network
Tanu Chawla, Dr. R. C. Mishra
Abstract: Mobile Ad hoc Network (MANET) is a network comprises of mobile nodes connected without any centralized administration. Each node in the network has the ability to share a large number of objects with other nodes. The nodes are connected with other nodes to forward a message to other nodes until the search for desired node succeeds. This paper represents a replication method to recover the performance in distributed system. Objects are replicated on different nodes in the network to minimize the search for an object. It is observed that mobility of nodes predicted using SOM (Self Organizing Maps) technique provides less accuracy. This paper represents an algorithm that uses the network parameters as input condition to replicate objects into the nodes. The decision for each node will be taken by gathering the input conditions and feed to the Hopfield Neural Network. It is view that it will provide more accuracy and improve the performance.
|IDSEP: Improved Deterministic Based Stability Election Protocol
Amanpreet Kaur,Ravreet Kaur
Abstract: In heterogeneous wireless sensor networks, some nodes turned their responsibility as head, so called cluster head as they are responsible to do services only to the nodes lies within their range (cluster). Cluster heads aggregate the data of their cluster nodes and transfer it to the sink. This dissertation proposed a new improved Stable Election Protocol (SEP) protocol in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed. The presented algorithm considers the sensor nodes are static and randomly distributed in the heterogeneous network, the coordinates of the sink and the dimensions of the sensor field are known.This research work proposes a new three-tier clustered heterogeneous network where the moderate and advanced nodes elect themselves as cluster heads for the increasing number of rounds based on their higher initial energy relative to other nodes. The main emphasis is to extend the time when all the nodes are available (i.e. Stability time of sensor networks). Comparison of proposed algorithm is also drawn with existing methods to evaluate the performance of proposed algorithm. It is found that proposed algorithm provides better results than existing as we have extended the stability time or when the first node dead time. Also last node dead or network lifetime is also increased. Proposed algorithm has also increase the throughput of the wireless sensor network.
|Modified Edge Detection based on the Theory of Universal Gravity-Implementation in MATLAB
Kokila Jandial, Nikita Kapoor, Harish Kundra
Abstract: In this paper we are going to study the modification of the original method by Genyun Sun et al. for edge detection based on the Law of Universal Gravitation. This study is based on a new approach for edge detection using gravitational search algorithm (GSA) and universal law of gravity. In the proposed approach the edges are detected using the law of universal gravity and movement of agents are computed using gravitational search algorithm. The proposed approach is able to detect the edge pixel in an image. The technique can be further extended for finding more edge pixels by modifying the gravitational search algorithm. The algorithm assumes that each image pixel is a celestial body with a mass represented by its grayscale intensity. Accordingly, each celestial body exerts forces onto its neighboring pixels and in return receives forces from the neighboring pixels. These forces can be calculated by the law of universal gravity. The vector sums of all gravitational forces along, respectively, the horizontal and the vertical directions are used to compute the magnitude and the direction of signal variations. Edges are characterized by high magnitude of gravitational forces along a particular direction and can therefore be detected.
|Threats to Mobile Agents: A Descriptive Technical Study and Reasoning
Hardeep Kaur, Dr. Jaswinder Singh Dilawari
Abstract: Mobile agent technology is a new paradigm of distributed computing, that models well some of services available in the net than other distributed computing approaches. Although this technology has generated considerable excitement in the research community, it has not been translated into a significant number of real-world applications due to a new dimensionality of security problems it brings along with it. In this paper threats in implementing mobile agent technology are discussed along with classified countermeasures to these threats. In last section of this paper a brief literature review is discussed so that limitations of past researches can be understood.
|Speckle Noise Reduction using Sticks Filtering from Ultrasound Images
Navjot Kaur, Sunil Khullar, Ranjit Bindal
Abstract: Ultrasound images capture a huge amount of details of medical patients. But these images are generally affected by speckle noise due to acquisition process or by transmission process . The numbers of algorithms are used to remove speckle noise from ultrasound image depending upon noise model. Number of researchers are working on the field of de-noise the images . In this paper we proposed an enhanced sticks filtering technique to reduce speckle noise from ultrasound images. We also studied different existing de-noising algorithms and compare them with the proposed method. The performance comparisons in terms of improvement in signal to noise ratio (SNR) of the proposed scheme, MSE (Mean Square Error) of the proposed method etc. This paper is the extension of the article earlier submitted by us in which we proposed this technique and this paper covers the result portion of proposed technique.
|Activity-Based Teaching for Effective Learning
Jasmine Kaur, Dr. Pooja
Abstract: A variety of interactive activities designed based on social constructivist principles had stimulated interest and involvement in the learning process with the positive outcome of seeing students actively participating in the construction of their own knowledge rather then being passive learners. At the end of such an interactive session, both the teacher and the students gained a sense of achievement and contentment. Substantial improvement in terms of deeper understanding of the topic and improved interpersonal skills were observed. Activity-based teaching was well appreciated by both the students and the staff as the final outcome of teaching and learning was achieved
|Enhanced Multimedia Storage Scheme using RSA & PGP Algorithms for Cloud Computing
Satvir Kaur, Nitika Kapoor, Harish Kundra
Abstract: Number of users used Cloud to store their data. Data storage security is defining as the security of data on the storage media. So, Security is an important factor in cloud computing for ensuring clients data is placed on the secure mode in the cloud. Data must not be stolen by the malicious users so authentication of client becomes a mandatory task. In this paper, we proposed a new security scheme by using RSA & PGP algorithm. In this work, both these techniques help to generate a secure session key which is valid only for a single session. One more feature of security is added and that is Signature. In this when user stores their data they have to enter a unique signature which will make our scheme more secure and hence the new security scheme helps to increase the security at cloud.
| Design and Implementation of Testing tool using Genetic Algorithm for Test Case Prioritization
Kirandeep Kaur, Vinay Chopra
Abstract: Software life cycle does not get complete without the proper testing of the software because a software performance gets decreased when we don’t minimize the small faults present in the code. A lot of testing techniques have been already implemented in the same contrast like Black box testing, white box testing and others. This paper focuses the improvement of the quality on the basis of the releasing unused memory when the software runs. There are always some variables in the code which are not used at run time and engage the software in producing more time to produce the output. In addition to the variables there are functions also which are not used but they block some memory in the lifecycle of the software. The computation of these unused memory can be done using Genetic Algorithm which passes the objective function a list of those blocks which are not used and the fitness function computes that what exact memory space can be freed and how the software can release the memory. For this task to achieve we have used VISUAL STUDIO as front end and ATCUT matrix dynamic link libraries for the comparison.